General
-
Target
3619e1f8e33018161a7c34ab7988bb28eb7f353381edc531b3a9232fcc207d31.exe
-
Size
120KB
-
Sample
241217-jxe9gsvlbw
-
MD5
90b47eba502c1b8afee365bd04a70aa1
-
SHA1
4bd43464e18a6bfdcf5711188bc8b517d748ab34
-
SHA256
3619e1f8e33018161a7c34ab7988bb28eb7f353381edc531b3a9232fcc207d31
-
SHA512
eec24c018e65729eb36ea1a58f0a582ec7c203d6b411ef91e05e2a96241053dbd26e2c6087df612f9a801f3bcfe50ab1b8402f284f97acbac1101b5abad7674d
-
SSDEEP
3072:rhVihrNh3l/uOBUloF/iyCFSwTPFixJfeihh/Gbe:rTIll/u+U0i7FFMJXhhZ
Static task
static1
Behavioral task
behavioral1
Sample
3619e1f8e33018161a7c34ab7988bb28eb7f353381edc531b3a9232fcc207d31.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
3619e1f8e33018161a7c34ab7988bb28eb7f353381edc531b3a9232fcc207d31.exe
-
Size
120KB
-
MD5
90b47eba502c1b8afee365bd04a70aa1
-
SHA1
4bd43464e18a6bfdcf5711188bc8b517d748ab34
-
SHA256
3619e1f8e33018161a7c34ab7988bb28eb7f353381edc531b3a9232fcc207d31
-
SHA512
eec24c018e65729eb36ea1a58f0a582ec7c203d6b411ef91e05e2a96241053dbd26e2c6087df612f9a801f3bcfe50ab1b8402f284f97acbac1101b5abad7674d
-
SSDEEP
3072:rhVihrNh3l/uOBUloF/iyCFSwTPFixJfeihh/Gbe:rTIll/u+U0i7FFMJXhhZ
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5